internet danger n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Internet Danger PowerPoint Presentation
Download Presentation
Internet Danger

Loading in 2 Seconds...

play fullscreen
1 / 7

Internet Danger - PowerPoint PPT Presentation


  • 167 Views
  • Uploaded on

Internet Danger. MOHAMAD AZAM BIN HASSAN MUHAMMAD SYAFIQ BIN MOHD SATA. Definition. Internet threats can come in various form or attacks The internet can create the illusion that strangers are actually “friends” The internet can damage your reputation. Identity Theft. Internet Predator.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Internet Danger' - thao


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
internet danger

Internet Danger

MOHAMAD AZAM BIN HASSAN

MUHAMMAD SYAFIQ BIN MOHD SATA

definition
Definition
  • Internet threats can come in various form or attacks
  • The internet can create the illusion that strangers are actually “friends”
  • The internet can damage your reputation
slide3

Identity Theft

Internet Predator

Digital Security Beach

Phishing Emails

Cyber Bullying

Hacker and Crackers

Cyber Stalking

shared resources vs dedicated resources
Shared Resources vs Dedicated Resources
  • Shared resources refer to devices or information on a computer that can be shared or accessed by many users; eg. Accessing folders, files, printers, scanner, emails and others.
  • Dedicated resources refer to a direct connection between a terminal and a service, network or computer to the specific use of a speticular user.
unethical behavior
Unethical Behavior
  • Using shared resources irresponsibly such as :
  • Downloading pirated software
  • Printing a lot of personal files
  • Storing files that have nothing to do with work such as personal photo files in the shared storage
  • Causing interference or obstruction to the others access to network resources such as the use of network bandwidth for downloading large files during the working hours
  • Using shared resources to do thing that cause impairment such as sending spam e-mails to customers
implications of violating the use of shared resources
Implications of Violating The Use of Shared Resources
  • Breach of security
  • The bandwidth can be congested or overwhelmed
  • Increased software piracy
how to permanently erase data from your old computer
How To Permanently Erase Data From Your Old Computer?
  • First, dismantle the computer or laptop
  • Second, take out the hard drive
  • Finally, physically destroy the hard drive